Multiple Choice
Trojan horse viruses are difficult to detect because ________.
A) they hide within the system until a certain time or condition is met
B) they allow a malicious user access to the system
C) they do not require any user action to be activated
D) they appear to be legitimate programs
Correct Answer:

Verified
Correct Answer:
Verified
Q25: A substitution cipher _.<br>A) changes the order
Q26: How is authentication in Kerberos handled?<br>A) With
Q27: Access rights define how various _ can
Q28: The Secure Sockets Layer does not _.<br>A)
Q29: A common software exploitation is a _.<br>A)
Q31: Which of the following is not true
Q32: Cryptography is important because it _.<br>A) protects
Q33: According to the text, approximately how many
Q34: Each cell in an access control matrix
Q35: A distributed denial-of-service attack is _.<br>A) an